A New Bayesian Approach to Exploring Damaged Assets by Monitoring Mission Failures Caused by Undetected Attack

Modern military systems operated with a complex of computers and software may have mission failure which is caused by undetected attacks. In such situations, it is important to find out which assets are damaged. After identifying damaged assets, we need to immediately examine the damaged assets to defend against the attacks. However, it is not straightforward to explore the damaged assets because there are the complicated relationships among assets, tasks and missions. In this paper, we propose an effective methodology to infer the damaged assets given observed mission impacts in a Bayesian framework. We used Bayesian networks to model assets, tasks, missions and to set the relationships among them. Our approach visually infers and identifies the damaged assets with the probability. We show that proposed Bayesian framework is practical and useful with the use case experiment.

[1]  J. Holsopple,et al.  Handling temporal and functional changes for mission impact assessment , 2013, 2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA).

[2]  Gabriel Jakobson,et al.  Mission cyber security situation assessment using impact dependency graphs , 2011, 14th International Conference on Information Fusion.

[3]  Larry W Fortson,et al.  Towards the Development of a Defensive Cyber Damage and Mission Impact Methodology , 2012 .

[4]  Natalie Nakhla,et al.  Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation , 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).

[5]  Leyla Bilge,et al.  Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.

[6]  Peng Liu,et al.  Using Bayesian networks for cyber security analysis , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[7]  Martín Barrère,et al.  Exact Inference Techniques for the Analysis of Bayesian Attack Graphs , 2015, IEEE Transactions on Dependable and Secure Computing.

[8]  Xiaoyan Sun,et al.  Who Touched My Mission: Towards Probabilistic Mission Impact Assessment , 2015, SafeConfig@CCS.

[9]  Michael A. Arbib,et al.  The handbook of brain theory and neural networks , 1995, A Bradford book.

[10]  Ralf Möller,et al.  Context- and bias-free probabilistic mission impact assessment , 2017, Comput. Secur..